Category: GBHackers

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool
09
Apr
2025

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting scope since late December 2024….

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA
09
Apr
2025

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass multi-factor authentication (MFA) and infiltrate…

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands
09
Apr
2025

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands

North Korean threat actors have demonstrated their adept use of social engineering techniques combined with Python scripting to infiltrate secure…

New Double-Edged Email Attack Steals Office 365 Credentials and Delivers Malware
09
Apr
2025

New Double-Edged Email Attack Steals Office 365 Credentials and Delivers Malware

Cybersecurity experts have uncovered a sophisticated phishing campaign that employs a double-edged tactic to compromise Office 365 credentials and deliver…

Windows Kerberos Vulnerability Enables Security Feature Bypass
09
Apr
2025

Windows Kerberos Vulnerability Enables Security Feature Bypass

Microsoft has disclosed a new security vulnerability in Windows operating systems, tracked as CVE-2025-29809. This flaw, classified with Important severity, impacts the Kerberos…

CISA Alerts on Active Exploitation of CentreStack Hard-Coded Key Vulnerability
09
Apr
2025

CISA Alerts on Active Exploitation of CentreStack Hard-Coded Key Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert highlighting a critical vulnerability in Gladinet CentreStack, a cloud-based…

Patches Released for Multiple Product Vulnerabilities
09
Apr
2025

Patches Released for Multiple Product Vulnerabilities

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

Windows Active Directory Vulnerability Enables Unauthorized Privilege Escalation
09
Apr
2025

Windows Active Directory Vulnerability Enables Unauthorized Privilege Escalation

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

Gcore Super Transit Brings Advanced DDoS Protection and Acceleration for Superior Enterprise Security and Speed
09
Apr
2025

Gcore Super Transit Brings Advanced DDoS Protection and Acceleration for Superior Enterprise Security and Speed

Gcore, the global edge AI, cloud, network, and security solutions provider, has launched Super Transit, a cutting-edge DDoS protection and…

HollowQuill Malware Targets Government Agencies Globally Through Weaponized PDF Documents
09
Apr
2025

HollowQuill Malware Targets Government Agencies Globally Through Weaponized PDF Documents

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

New Mirai Botnet Variant Exploits TVT DVRs to Gain Admin Control
09
Apr
2025

New Mirai Botnet Variant Exploits TVT DVRs to Gain Admin Control

GreyNoise has noted a sharp escalation in hacking attempts targeting TVT NVMS9000 Digital Video Recorders (DVRs). The surge in malicious…

Ransomware Groups Target Organizations to Exfiltrate Data and Blackmail via Leak Site Posts
09
Apr
2025

Ransomware Groups Target Organizations to Exfiltrate Data and Blackmail via Leak Site Posts

Ransomware attacks have continued their relentless assault on organizations worldwide, with a focus on data exfiltration and subsequent blackmail through…